
Hadoop: Big Data Security
Hadoop environment represents potential security vulnerabilities
Big Data is about extracting business intelligence and real-time analytical capabilities from extreme volumes, and continually growing variety of data from many media streams. Even if big data environments like Hadoop are relatively new, the fact of the matter is that data security problems in big data environments are critical to solve up-front. Where there is data, there is the potential for privacy breaches, unauthorised access, or inappropriate access by privileged users.
Hadoop for Big Data
Early Apache Hadoop use models were based on clusters of machines processing large amounts of public data (crawled web pages) inside a private data center. Given that the collected data was already public, the need to protect the data and its results was an unnecessary aspect of the implementation.
But as Hadoop has grown, so have the use models to which it is being applied. Today, not only are private data sets being processed, but Hadoop is being applied to multi-tenant scenarios in which varying datasets are being processed by a variety of users (each with different needs for the raw and processed data). Hadoop is also increasingly applied to sensitive data sets where data must be encrypted to avoid leaks. For this reason, security is now considered an integral part of a Hadoop cluster management.
Solution Features & Benefits
Pass audits and avoid hefty non-compliance fines
Free up IT resources and budget by automating labour intensive Big Data compliance activities
- Apply policy and alerts on data access and activity.
- Identify and document non-compliant / fraudulent behaviour
- Meet compliance (HIPAA, PCI-DSS, SOX, FERPA, EU data protection) that require at-rest encryption and key management.
Centralise Hadoop Security
Secure and automate existing manual Hadoop processes
- Monitor all database transactions, including those of privileged users, at the operating system kernel level
- Vulnerability assessment
- Mask confidential data or information within big data documents
- Transparent encrypted communications between the server and agents
- Authentication - prevent user impersonation - enforce user authentication for access control
- Secure Keys - ensure sensitive data and encryption keys are never stored in plain text or exposed publicly
- Policy and controls - set policy controls on sensitive data
- Privilege user access control
- Manage
|
|
Integration
- with leading HSMs
- cloud and virtualisation aware
Backup and Disaster Recovery
- Data Backup snapshots
- Data replication
Solution Platform Options
- On-premise
- Cloud / Software-as-a-Service managed service
Professional & Managed Services
- Hadoop Database penetration / vulnerability testing
![]()
P: +44(0)7714 209927
S: +44(0)1273 329753
| ![]()
info@securenetconsulting.co.uk
|